[MAVEN:GHSA-V8X6-59G4-5G3W] Denial of service binding form from JSON in Play Framework

Severity High
Affected Packages 2
Fixed Packages 2
CVEs 1

Impact

A denial-of-service vulnerability has been discovered in Play's forms library, in both the Scala and Java APIs. This can occur when using either the Form#bindFromRequest method on a JSON request body or the Form#bind method directly on a JSON value. If the JSON data being bound to the form contains a deeply-nested JSON object or array, the form binding implementation may consume all available heap space and cause an OutOfMemoryError. If executing on the default dispatcher and akka.jvm-exit-on-fatal-error is enabled—as it is by default—then this can crash the application process.

Form.bindFromRequest is vulnerable when using any body parser that produces a type of AnyContent or JsValue in Scala, or one that can produce a JsonNode in Java. This includes Play's default body parser.

Patches

This vulnerability been patched in version 2.8.16. There is now a global limit on the depth of a JSON object that can be parsed, which can be configured by the user if necessary.

Workarounds

Applications that do not need to parse a request body of type application/json can switch from the default body parser to another body parser that supports only the specific type of body they expect; for example, the formUrlEncoded body parser can be used if the Play action only needs to accept application/x-www-form-urlencoded.

Package Affected Version
pkg:maven/com.typesafe.play/play_2.13 >= 2.8.3, < 2.8.16
pkg:maven/com.typesafe.play/play_2.12 >= 2.8.3, < 2.8.16
ID
MAVEN:GHSA-V8X6-59G4-5G3W
Severity
high
URL
https://github.com/advisories/GHSA-v8x6-59g4-5g3w
Published
2022-06-03T22:18:58
(2 years ago)
Modified
2023-01-27T05:03:11
(20 months ago)
Rights
Maven Security Team
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/com.typesafe.play/play_2.13 com.typesafe.play play_2.13 >= 2.8.3 < 2.8.16
Fixed pkg:maven/com.typesafe.play/play_2.13 com.typesafe.play play_2.13 = 2.8.16
Affected pkg:maven/com.typesafe.play/play_2.12 com.typesafe.play play_2.12 >= 2.8.3 < 2.8.16
Fixed pkg:maven/com.typesafe.play/play_2.12 com.typesafe.play play_2.12 = 2.8.16
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...